Secure Key Establishment

CHF 140.35
Auf Lager
SKU
AREAMLVC4KJ
Stock 1 Verfügbar
Geliefert zwischen Di., 25.11.2025 und Mi., 26.11.2025

Details

Secure Key Establishment discusses the problems encountered in this field. It also introduces several improved protocols with new proofs of security and covers several variants of the widely accepted Bellare and Rogaway model.

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the BellareRogaway model and the CanettiKrawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the BellareRogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.


Introduces several improved protocols with new proofs of security Identifies several variants of the key sharing requirement including a brief discussion regarding the key sharing requirement Provides an integrative framework that allows protocols to be analyzed in a modified version of the BellareRogaway model using the automated model checker tool

Inhalt
Background Materials.- A Flawed BR95 Partnership Function.- On The Key Sharing Requirement.- Comparison of BellareRogaway and CanettiKrawczyk Models.- An Extension to the BellareRogaway Model.- A Proof of Revised Yahalom Protocol.- Errors in Computational Complexity Proofs for Protocols.- On Session Key Construction.- Complementing Computational Protocol Analysis.- An Integrative Framework to Protocol Analysis and Repair.- Conclusion and Future Work.

Weitere Informationen

  • Allgemeine Informationen
    • GTIN 09781441946898
    • Sprache Englisch
    • Auflage Softcover reprint of hardcover 1st edition 2009
    • Größe H235mm x B155mm x T13mm
    • Jahr 2010
    • EAN 9781441946898
    • Format Kartonierter Einband
    • ISBN 1441946896
    • Veröffentlichung 25.11.2010
    • Titel Secure Key Establishment
    • Autor Kim-Kwang Raymond Choo
    • Untertitel Advances in Information Security 41
    • Gewicht 365g
    • Herausgeber Springer US
    • Anzahl Seiten 236
    • Lesemotiv Verstehen
    • Genre Informatik

Bewertungen

Schreiben Sie eine Bewertung
Nur registrierte Benutzer können Bewertungen schreiben. Bitte loggen Sie sich ein oder erstellen Sie ein Konto.
Made with ♥ in Switzerland | ©2025 Avento by Gametime AG
Gametime AG | Hohlstrasse 216 | 8004 Zürich | Schweiz | UID: CHE-112.967.470